Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2408 Security Bulletin: Remote code execution vulnerability in the JSF used by WebSphere Application Server 17 August 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM WebSphere Application Server Publisher: IBM Operating System: AIX HP-UX IBM i Solaris Windows z/OS Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade Original Bulletin: http://www.ibm.com/support/docview.wss?uid=ibm10716525 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Remote code execution vulnerability in the JSF used by WebSphere Application Server Document information More support for: WebSphere Application Server Software version: 7.0, 8.0, 8.5.5 Operating system(s): AIX, HP-UX, IBM i, Solaris, Windows, z/OS Software edition: Advanced, Base, Developer, Enterprise, Express, Network Deployment, Single Server Reference #: 0716525 Modified date: 15 August 2018 Summary There is a remote code execution vulnerability in the JSF Sun Reference Implementation 1.2 used by WebSphere Application Server. The JSF Sun Reference Implementation 1.2 is used as the default in WebSphere Application Server v7.0, other versions it is not the default. Vulnerability Details CVEID: Not Applicable DESCRIPTION: Apache MyFaces and Oracle Mojarra could allow a remote attacker to execute arbitrary code on the system, caused by improper configuration of ViewState settings. If ViewState is configured to use unencrypted state information, an attacker could exploit this vulnerability to execute any code residing in the server's classpath. CVSS Base Score: 8.1 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/ 145172 for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions This vulnerability affects the following versions and releases of IBM WebSphere Application Server: o Version 8.5 o Version 8.0 o Version 7.0 Remediation/Fixes The recommended solution is to apply the interim fix, Fix Pack or PTF containing APARs PI99524 for each named product as soon as practical. JSF SunRI 1.2 is the default implementation for WebSphere Application Server Version 7. For Version 8.0 and Version 8.5 , JSF SunRI 1.2 is not the default JSF, you would only be vulnerable if you have changed to use JSF SunRI 1.2. For WebSphere Application Server traditional and WebSphere Application Server Hypervisor Edition using JSF Sun Reference Implementation 1.2: For V8.5.0.0 through 8.5.5.14: (not default JSF) . Upgrade to minimal fix pack levels as required by interim fixes and then apply Interim Fix PI99524 - --OR-- . Apply Fix Pack 8.5.5.15 or later (targeted availability 1Q2019). For V8.0.0.0 through 8.0.0.15: (not default JSF) . Upgrade to a minimal fix pack levels as required by interim fix and then apply Interim Fix PI99524 For V7.0.0.0 through 7.0.0.45: . Upgrade to a minimal fix pack levels as required by interim fix and then apply Interim Fix PI99524 WebSphere Application Server V7 and V8 are no longer in full support; IBM recommends upgrading to a fixed, supported version/release/platform of the product. Change History 14 August 2018: original document published *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin. Disclaimer According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW3ZSYWaOgq3Tt24GAQhINRAAlBiVZoaSbMW9knoyrtacahrgg/jVfLrD DKpIS/mM7Rnecl+5VwrLjTnM8SD4iNNShkkxwAg1ZpHGqElAwOaqxO3XOh8yH6Q2 tHK7m0DHNnzoZnEiQF+WyuatT3Co9gCrympBkuu+K+5uTwbHLWNtmOHz59MQsuk5 mTpOAeWiNnhcuM8rNlw3aTRQx80N12AxDga9xGQD3cV7iI8VaS67bUDNSvUKTsVD 2erxYXSPXk1E6CpoPzENpWtVu3m3UMkx9DTSixW6VAtHbJGiaKgZFmmZooAGvPnL uwJsvqa5yLGjq1C8tOiOo1Jp2003eS493rMmhQSOcbrrNEO+Rea7UMhHDEace4x3 Qi0FN2bUKKdlBhckwREWFvI6mFOYCMmRYZ/hCs97Jl3z/3lbNd47ttvYk2AgS8ee P6piUWAnvHG6+aWhR4MKAlIOBl0ysv63adgkjohUE6Lt9tF3o5rmmJBkuX8DgDkw S1qh759XWjsIFBpMx509hLw/pirZjtnpdpd2CE3nU7x1XS9yL+3/npxof0mInWMz Wbu7q1hZYsKIP5YRF6m9WgztFzW2n7pd0kly3q4SffzsJvlSjyAGmdREf/E3ZdMX GBqx7+EuyogPI/SSTdIcCwFiNxQQOtK7aPzeiGxJs7L8wiw6k8pxTmRqXN0zKDc1 9IhYfnzt0Jc= =/ds1 -----END PGP SIGNATURE-----